共 230 条
[6]
A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate
[J].
JOURNAL OF CYBERSECURITY,
2018, 4 (01)
[7]
ENSEMBLE TECHNIQUE FOR INTRUDER DETECTION IN NETWORK TRAFFIC
[J].
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS,
2019, 13 (03)
:1-8
[8]
Towards Improving the Intrusion Detection through ELM (Extreme Learning Machine)
[J].
CMC-COMPUTERS MATERIALS & CONTINUA,
2020, 65 (02)
:1097-1111